Sciweavers

915 search results - page 97 / 183
» Proof labeling schemes
Sort
View
IACR
2011
94views more  IACR 2011»
12 years 7 months ago
After-the-Fact Leakage in Public-Key Encryption
What does it mean for an encryption scheme to be leakage-resilient? Prior formulations require that the scheme remains semantically secure even in the presence of leakage, but onl...
Shai Halevi, Huijia Lin
PKC
2012
Springer
237views Cryptology» more  PKC 2012»
11 years 10 months ago
Relatively-Sound NIZKs and Password-Based Key-Exchange
We define a new notion of relatively-sound non-interactive zeroknowledge (NIZK) proofs, where a private verifier with access to a trapdoor continues to be sound even when the Ad...
Charanjit S. Jutla, Arnab Roy
ICPR
2006
IEEE
14 years 9 months ago
Non-Iterative Two-Dimensional Linear Discriminant Analysis
Linear discriminant analysis (LDA) is a well-known scheme for feature extraction and dimensionality reduction of labeled data in a vector space. Recently, LDA has been extended to...
Kohei Inoue, Kiichi Urahama
ICDAR
2009
IEEE
14 years 2 months ago
Raster Map Image Analysis
Raster map images (e.g., USGS) provide much information in digital form; however, the color assignments and pixel labels leave many serious ambiguities. A color histogram classi...
Thomas C. Henderson, Trevor Linton
ICIP
1998
IEEE
14 years 10 days ago
Video Object Segmentation Introducing Depth and Motion Information
In the paper we present a method to estimate relative depth between objects in scenes of video sequences. The information for the estimation of the relative depth is obtained from...
Montse Pardàs